Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social patterns: Community detection using behavior-generated network datasets., , , , , , , , , and 1 other author(s). NSW, page 82-89. IEEE Computer Society, (2013)Chaff Allocation and Performance for Network Traffic Obfuscation., , , , , and . ICDCS, page 1565-1568. IEEE Computer Society, (2018)Multi-Domain Integration and Correlation Engine., , , , , , , , , and . MILCOM, page 1-9. IEEE, (2018)Type based abstraction for QoI aware applications., and . MILCOM, page 1-6. IEEE, (2012)Uncertainty of Information Applied to Network Monitoring Metrics., , and . HCI (51), volume 14734 of Lecture Notes in Computer Science, page 403-410. Springer, (2024)What Color is Your Swan? Uncertainty of Information Across Data., , and . HCI (41), volume 14051 of Lecture Notes in Computer Science, page 383-388. Springer, (2023)Network Traffic Obfuscation: An Adversarial Machine Learning Approach., , , , and . MILCOM, page 1-6. IEEE, (2018)Quality of information approach to improving source selection in tactical networks., , , and . FUSION, page 566-573. IEEE, (2015)Exploring dependencies of networks of multi-genre network experiments., , , and . MILCOM, page 576-581. IEEE, (2016)Efficient chaff-aided obfuscation in resource constrained environments., , , and . MILCOM, page 97-102. IEEE, (2017)